期刊文献+

冬季养生在于“藏”

下载PDF
导出
出处 《北京档案》 北大核心 2006年第10期50-50,共1页 Beijing Archives
  • 相关文献

参考文献3

二级参考文献6

  • 1[1]Techniques Adopted By 'System Crackers' When Attempting To Break Into Corporate or Sensitive Private Networks[M].By the consultants of the Network Security Solutions Ltd. Front-line Information Security Team(FIST), 1998.12 被引量:1
  • 2[2]Abdelaziz Mounji.Languages and Tools for Rule-Based Ditributed Intrusion Detection.The degree of Doctor of Computer Science Department of Facultes University,Belgioum,1997.9 被引量:1
  • 3[3]Request For Comments 791,792,793 被引量:1
  • 4[4]Calvin Ko,George Fink,Karl Levitt. Automated Detection of vunerabilities in Privileged Programs by Execution Monitoring[M].Depet.of Computer Seience,Davice,University of California 被引量:1
  • 5[5]Karyn Piehnarczyk,Steve Weeber,Riehard Feingold. Unix Incident Guide:How to Detect an Intrusion[S].CIAC-2305 R.1 被引量:1
  • 6http:wwwCRL2SRIcom 被引量:1

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部